For fast online assistance with network security issues, businesses in Durham, NC, can find world-class support by contacting Progent's certified security professionals. Progent's online support consultants are available to provide fast and low-cost help with security problems that are impacting the productivity of your information system. Progent's security engineers are qualified to support systems based on Microsoft, Linux, Apple macOS and OS X, Sun, and major derivatives of UNIX. Progent's broad range of consulting services encompasses firewall technology, email security, protected system design, and business continuity planning. Progent's technical support staff has been awarded the world's top security certifications including Global Information Assurance Certification and CISSP.

Progent offers online security assistance on a by-the-minute basis with no minimum times and without additional fees for setup or after hours service. By charging by the minute and by providing top-level help, Progent's billing structure keeps expenses under control and avoids situations where quick solutions turn into big bills.

We've Been Hacked: What Are We Supposed to Do?
In case your network is now fighting a security emergency, go to Progent's Urgent Remote Technical Support to find out how to receive fast aid.

For companies that have planned in advance for being hacked, the formal incident response model outlined by GIAC is Progent's preferred method of reacting to a serious security attack.

Overview of Security Services
Coordinating data protection and planning for restoring critical data and functions following a security breach demands an on-going process that entails a variety of technologies and processes. Progent's certified consultants can help your business at all levels in your attempt to protect your IT system, ranging from security audits to creating a complete security program. Some technologies supported by Progent's experts include Planning and Implementation, Information Recovery and Security Forensics, and Managed Filtering of Email-Based Spam and Viruses.

Planning and Building Secure Environments
Every organization should develop a thoroughly thought out security strategy that incorporates both proactive and reactive steps. The proactive plan is a collection of steps that helps to reduce security gaps. The post-attack plan defines procedures to assist security staff to assess the damage resulting from a breach, remediate the damage, document the event, and restore business functions as soon as feasible. Progent can advise you how to incorporate security into your business operations. Progent can install scanning utilities, define and build a safe IT infrastructure, and recommend processes and policies to optimize the safety of your network. Progent's security professionals are available to assist you to set up a firewall, deploy secure offsite connectivity to email and information, and configure an efficient VPN.

If your company is interested in an affordable option for outsourcing your network security management, Progent's Round-the-clock Network Support Packages feature non-stop online network tracking and fast response to problems.

Hybrid Cloud Solutions
Progent can help your company you to plan, implement, manage and repair enterprise hybrid cloud solutions that include local and cloud resources and that comply with government and industry data security requirements. (Learn about Progent's Office 365 integration solutions with on-premises Exchange deployments, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

System Recovery and Security Forensics
Progent has expertise in recovering systems and devices that have been hacked, are in question, or have failed because of a security penetration. Progent can show you how to assess the losses caused by the breach, return your company to normal functions, and retrieve information compromised owing to the assault. Progent's security engineers can also oversee a thorough forensic analysis by examining event logs and using other advanced forensics tools. Progent's experience with security consulting minimizes your off-air time and permits Progent to recommend effective measures to prevent or mitigate new assaults.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis technology to guard endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to automate the complete threat lifecycle including filtering, detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer economical multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, device control, and web filtering via cutting-edge tools packaged within one agent accessible from a unified console. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP environment that meets your organization's specific requirements and that helps you demonstrate compliance with legal and industry data protection standards. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup activities and enables rapid restoration of critical files, apps and VMs that have become lost or corrupted due to component failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can deliver advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top information security vendors to provide web-based control and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of analysis for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to track and protect internal email that stays inside your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the system is virtualized, it can be ported immediately to an alternate hardware solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard information about your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can eliminate as much as 50% of time thrown away looking for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you’re planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require when you need it. Learn more details about ProSight IT Asset Management service.

Special Security Expertise Available from Progent
Progent's veteran consultants offer unique specialized help in vital areas of network protection including:

Security Vulnerability Audits and Security Compliance Assessment
Progent offers expertise with information risk auditing tools such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of comprehensive network tests to uncover possible security problems. Progent has broad experience with testing utilities and can assist your company to understand audit reports and respond efficiently. Progent's security consultants also provide web software testing and can perform thorough evaluation of enterprise-wide security to determine your organization's compliance with key industry security specifications including HIPAA, PCI, and ISO 17799. Also, Progent can assess the strength of your wireless security covering in-place wireless equipment plus portable devices. Read additional information about Progent's Information Risk Evaluation and Compliance Testing.

Cisco Network Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Support
Progent's Cisco CCIE engineers and Cisco CCNP experts can deliver in-depth consulting expertise for Cisco's entire family of protection and Virtual Private Network (VPN) technologies such as PIX 500 Series Firewalls and ASA 5500 Firewalls, the Catalyst FWSM, secure high-speed and integrated services (IS) routers, Aironet wireless access points and bridges, Meraki cloud-managed access points, and Catalyst Series switches. Learn more details concerning Cisco Protection, VPN and Wireless Help.

Other Firewall and Virtual Private Network Solutions
In addition to supporting a broad array of security solutions available from Microsoft and Cisco, Progent offers companies of any size advanced support for technologies from other important firewall and Virtual Private Network suppliers. Progent's consultants offer:

Unannounced Intrusion Testing Services
Stealth intrusion checking is a key technique for helping businesses to find out how vulnerable their IT environments are to serious threats by showing how effectively network protection procedures and technologies hold up to authorized but unpublicized intrusion attempts launched by veteran security specialists utilizing the latest intrusion methods. Learn additional details concerning Progent's Penetration Testing Services.

Certified Information Security Manager Security Consulting Services
Certified Information Security Manager (CISM) Experts for Durham, North CarolinaCertified Information Security Manager (CISM) defines the core competencies and international standards of service that information technology security professionals are expected to achieve. It provides business management the assurance that those who have earned their accreditation possess the background and knowledge to provide efficient security management and consulting support. Progent can offer a CISM consultant to assist your organization in critical security disciplines including information protection governance, risk management, data security program management, and crisis response management.

Find out the details concerning Progent's Certified Information Security Manager (CISM) Security Support Assistance.

CISSP Security Support Expertise
CISSP Qualified Network Security Professionals for Durham, North CarolinaProgent's CISSP consultants are security engineers who have earned CISSP certification as a result of demonstrated experience, rigorous study, and exhaustive examination. CISSP qualification indicates expertise in an international standard for information security. American National Standards Institute has given the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security management practices, security design and test systems, connection control methodology, applications development security, operations security, hardware security, encryption, telecommunications, Internet security, and disaster recovery planning.

Find out more information about Progent's CISSP Support Expertise.

ISSAP-Qualified Engineers for Secure System Infrastructure
ISSAP Information Systems Security Architecture Professionals (ISSAP) for Durham, North CarolinaProgent's ISSAP certified security consultants are experts who have earned ISSAP certification following rigorous examination and significant hands-on work with information security architecture. ISSAP consultants possess in-depth knowledge of access control mechanisms and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-qualified security specialists can help your company with all phases of architecture security.

Learn additional details about Progent's ISSAP Certified Secure IT Architecture Consulting Services.

Certified Information Systems Auditor (CISA) Consulting Services
Certified Information Systems Auditor Engineers for Durham, North CarolinaThe CISA accreditation is a recognized achievement that represents expertise in network security auditing. Accredited by the American National Standards Institute, the CISA credential has consultants pass an extensive test administered by the ISACA professional group. Progent offers the expertise of a CISA-certified security audit professional trained to help businesses in the areas of IS audit process, IT administration, systems and infrastructure planned useful life, IT support, protecting information resources, and business continuity preparedness.

Get additional information concerning Progent's CISA Professional Services.

CRISC Risk Management Experts
CRISC IT Risk Experts for Durham, North CarolinaThe Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's ability to plan, implement, and maintain information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a business continuity strategy based on industry best practices identified by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's risk management services are a good fit the support available from Progent's CISA-certified consultants for objectively evaluating your IT control mechanisms and with the services of Progent's CISM consultants for defining security policies.

Learn the details concerning Progent's CRISC-certified IT Risk Management Services.

GIAC Support Expertise
Network Security Consultants with GIAC (Global Information Assurance Certification) for Durham, North CarolinaGIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of computer security engineers. GIAC's mission is to assure that an accredited security consultant has the skills necessary to provide support in key areas of system, data, and application program security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent can provide the support of certified consultants for any of the network security disciplines covered under GIAC certification topics including auditing networks, security incident handling, intrusion detection, web application security, and SIEM solutions.

Find out additional information concerning Progent's GIAC Information Assurance Services.

Get in Touch with Progent for Network Security Support
If your business is located in Durham or anywhere in the state of North Carolina and you're looking for security expertise, telephone Progent at 800-993-9400 or refer to Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.